Marten van Dijk
Marten van Dijk
Professor, ECE Department, University of Connecticut
Verified email at uconn.edu - Homepage
TitleCited byYear
Fully homomorphic encryption over the integers
M Van Dijk, C Gentry, S Halevi, V Vaikuntanathan
Annual International Conference on the Theory and Applications of …, 2010
16802010
Silicon physical random functions
B Gassend, D Clarke, M Van Dijk, S Devadas
Proceedings of the 9th ACM conference on Computer and communications …, 2002
13202002
Extracting secret keys from integrated circuits
D Lim, JW Lee, B Gassend, GE Suh, M Van Dijk, S Devadas
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 13 (10 …, 2005
8102005
A technique to build a secret key in integrated circuits for identification and authentication applications
JW Lee, D Lim, B Gassend, GE Suh, M Van Dijk, S Devadas
2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No …, 2004
6742004
AEGIS: architecture for tamper-evident and tamper-resistant processing
GE Suh, D Clarke, B Gassend, M Van Dijk, S Devadas
ACM International Conference on Supercomputing 25th Anniversary Volume, 357-368, 2014
6682014
Path ORAM: an extremely simple oblivious RAM protocol
E Stefanov, M Van Dijk, E Shi, C Fletcher, L Ren, X Yu, S Devadas
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
6152013
Controlled physical random functions
B Gassend, D Clarke, M Van Dijk, S Devadas
18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002
3752002
Efficient memory integrity verification and encryption for secure processors
GE Suh, D Clarke, B Gassend, M Dijk, S Devadas
Proceedings of the 36th annual IEEE/ACM International Symposium on …, 2003
3242003
Caches and hash trees for efficient memory integrity verification
B Gassend, GE Suh, D Clarke, M Van Dijk, S Devadas
The Ninth International Symposium on High-Performance Computer Architecture …, 2003
3042003
On the impossibility of cryptography alone for privacy-preserving cloud computing.
M Van Dijk, A Juels
HotSec 10, 1-8, 2010
2732010
Identification and authentication of integrated circuits
B Gassend, D Lim, D Clarke, M Van Dijk, S Devadas
Concurrency and Computation: Practice and Experience 16 (11), 1077-1098, 2004
2422004
Authentication of integrated circuits
D Clarke, B Gassend, M Van Dijk, S Devadas
US Patent 7,840,803, 2010
2062010
Optical disc system for digital video recording
T Narahara, S Kobayashi, M Hattori, Y Shimpuku, GJ van den Enden, ...
Japanese Journal of Applied Physics 39 (2S), 912, 2000
2032000
Iris: A scalable cloud file system with efficient integrity checks
E Stefanov, M van Dijk, A Juels, A Oprea
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
1902012
Analysis of the sensitivity attack against electronic watermarks in images
JPMG Linnartz, M Van Dijk
International Workshop on Information Hiding, 258-272, 1998
1901998
On the information rate of perfect secret sharing schemes
M Van Dijk
Designs, Codes and Cryptography 6 (2), 143-169, 1995
1791995
FlipIt: The game of “stealthy takeover”
M Van Dijk, A Juels, A Oprea, RL Rivest
Journal of Cryptology 26 (4), 655-713, 2013
1712013
A secure processor architecture for encrypted computation on untrusted programs
CW Fletcher, M Dijk, S Devadas
Proceedings of the seventh ACM workshop on Scalable trusted computing, 3-8, 2012
1652012
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
LFG Sarmenta, M Van Dijk, CW O'Donnell, J Rhodes, S Devadas
Proceedings of the first ACM workshop on Scalable trusted computing, 27-42, 2006
1232006
Design space exploration and optimization of path oblivious RAM in secure processors
L Ren, X Yu, CW Fletcher, M Van Dijk, S Devadas
ACM SIGARCH Computer Architecture News 41 (3), 571-582, 2013
1142013
The system can't perform the operation now. Try again later.
Articles 1–20